Skip to content
GitLab
Projects Groups Snippets
  • /
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in
  • Helmholtz Marketplace Server Helmholtz Marketplace Server
  • Project information
    • Project information
    • Activity
    • Labels
    • Members
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributors
    • Graph
    • Compare
  • Issues 0
    • Issues 0
    • List
    • Boards
    • Service Desk
    • Milestones
  • Merge requests 0
    • Merge requests 0
  • CI/CD
    • CI/CD
    • Pipelines
    • Jobs
    • Schedules
  • Deployments
    • Deployments
    • Environments
    • Releases
  • Packages and registries
    • Packages and registries
    • Package Registry
    • Container Registry
    • Infrastructure Registry
  • Monitor
    • Monitor
    • Metrics
    • Incidents
  • Analytics
    • Analytics
    • Value stream
    • CI/CD
    • Repository
  • Wiki
    • Wiki
  • Snippets
    • Snippets
  • Activity
  • Graph
  • Create a new issue
  • Jobs
  • Commits
  • Issue Boards
Collapse sidebar
  • Helmholtz Cloud PortalHelmholtz Cloud Portal
  • Helmholtz Marketplace ServerHelmholtz Marketplace Server
  • Merge requests
  • !9

introduce vulnerability scan

  • Review changes

  • Download
  • Email patches
  • Plain diff
Merged Ghost User requested to merge helmholtz-cloud-portal/carstenheidmann/helmholtz-marketplace-server:pr-vulnerability-scan into master Jul 23, 2020
  • Overview 3
  • Commits 2
  • Pipelines 0
  • Changes 2

Introduce vulnerability scan

Motivation:

Since we are providing a service which is open to the public we should be aware of vulnerabilities in our code as well in our libraries. For our own code we already have Sonja which covers at least some of it, for the dependencies there is a Maven plugin.

Modifications:

Add the Maven Dependency-Check plugin (https://jeremylong.github.io/DependencyCheck/index.html) to the build.

Result:

The plugin binds to the verify stage of the Maven build and lets the build fail if there are vulnerabilities with a score greater than or equal to the configured CVSS value (currently 8)

Target: master

Request:

Acked-by: @femiadeyemi

Pull-request: !9 (merged)

Edited Aug 05, 2020 by Ghost User
Assignee
Assign to
Reviewers
Request review from
Time tracking
Source branch: pr-vulnerability-scan

Privacy | Imprint | Support | Status | Documentation | Changelog